Search result for Authentication and security Online Courses & Certifications
Get Course Alerts by Email
Cloud Application Security
by Rick Smith- 0.0
Approx. 6 hours to complete
● List and describe the OWASP Top 10 vulnerabilities. ● Describe the application of authentication factors and federated identity solutions in cloud client and server authentication. ● Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed. Architecture and Authentication...
API Security on Google Cloud's Apigee API Platform
by Google Cloud Training- 4.6
Approx. 8 hours to complete
You explore the security concerns you will encounter for your APIs. You will learn about JSON Web Tokens (JWTs) and federated security. API Security Concerns Identity, Authentication, and Authorization JWT, JWS, SAML, and OpenID Connect Module Quiz - Authentication, Authorization and OAuth Module 2: Content, Transport, and Platform Security Module Quiz - Content, Transport, and Platform Security...
Usable Security
by Jennifer Golbeck- 4.6
Approx. 12 hours to complete
This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system. Usable Authentication and Passwords...
Cloud Security Basics
by Rick Smith- 4.7
Approx. 13 hours to complete
We'll learn and apply classic security techniques to today’s cloud security problems. We’ll build our own web service case studies and construct security solutions for them. Our toolkit contains classic security concepts like Least Privilege and Separation of Duty, as well as more technical cryptographic and access control techniques. Step 6 and Cloud Security...
Intro to Information Security
by Wenke Lee , Mustaque Ahamad , Catherine Gamboa- 0.0
Approx. 0
lesson 1 Foundations Security mindset Essential concepts (policy CIA etc. ) lesson 2 Software security Vulnerabilities and protections Malware Program analysis lesson 3 Practical cryptography Encryption Authentication Hashing Symmetric and asymmetric crypto lesson 4 Networks Wired and wireless networks Protocols Attacks and countermeasures lesson 5 Applications and special topics Databases Web apps Privacy and anonymity Voting Public policy...
Free
Access Controls
by (ISC)² Education & Training- 4.7
Approx. 15 hours to complete
Authentication Mechanisms: Kerberos Applications and Process Authentication Mechanisms: Kerberos Considerations and Tools Authentication Mechanisms: Kerberos Applications and Process Authentication Mechanisms: Kerberos Considerations and Tools Implement Access Controls: Security Architecture and Models Implement Access Controls: Security Architecture and Models Implement Access Controls: BLP and Biba Model Comparison Implement Access Controls: BLP and Biba Model Comparison...
Cyber Attack Countermeasures
by Dr. Edward G. Amoroso- 4.8
Approx. 19 hours to complete
This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema. Identification and Authentication Authentication Protocol Schema and Zones Hand-Held Authentication Protocol (Part 2: Analysis and Cryptanalysis)...
Related searches
Cryptographic Hash and Integrity Protection
by Sang-Yoon Chang- 4.5
Approx. 9 hours to complete
Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Cryptographic Hash Function Requirements: One-Way and Collision Properties Cryptographic Hash Function Security Message Authentication Approaches and Using Symmetric Encryption for Message Authentication...
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
Acquire knowledge about security needs and the application of information security systems. Software Security Flaws and Threats Network Security and Authentication - Part 1 Network Security and Authentication - Part 2 Additional (optional) Resources: Software Security and Secure Programming Practices Additional (optional) Resources: Network Security and Authentication, Part 1 Additional (optional) Resources: Network Security and Authentication, Part 2...
Windows Server Management and Security
by Greg Williams- 4.7
Approx. 12 hours to complete
This course is the second course in the System Management and Security Specialization focusing on enterprise system management. Week 4 explores built in security features of Windows and demonstrates how to use each technology effectively and in what circumstances you would use what technology for what purpose. Users and authentication in a Windows environment Users and Authentication...